Search results for: gene co-expression network
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5994

Search results for: gene co-expression network

5694 Genome-Wide Expression Profiling of Cicer arietinum Heavy Metal Toxicity

Authors: B. S. Yadav, A. Mani, S. Srivastava

Abstract:

Chickpea (Cicer arietinum L.) is an annual, self-pollinating, diploid (2n = 2x = 16) pulse crop that ranks second in world legume production after common bean (Phaseolus vulgaris). ICC 4958 flowers approximately 39 days after sowing under peninsular Indian conditions and the crop matures in less than 90 days in rained environments. The estimated collective yield losses due to abiotic stresses (6.4 million t) have been significantly higher than for biotic stresses (4.8 million t). Most legumes are known to be salt sensitive, and therefore, it is becoming increasingly important to produce cultivars tolerant to high-salinity in addition to other abiotic and biotic stresses for sustainable chickpea production. Our aim was to identify the genes that are involved in the defence mechanism against heavy metal toxicity in chickpea and establish the biological network of heavy metal toxicity in chickpea. ICC4958 variety of chick pea was taken and grown in normal condition and 150µM concentration of different heavy metal salt like CdCl₂, K₂Cr2O₇, NaAsO₂. At 15th day leave samples were collected and stored in RNA Later solution microarray was performed for checking out differential gene expression pattern. Our studies revealed that 111 common genes that involved in defense mechanism were up regulated and 41 genes were commonly down regulated during treatment of 150µM concentration of CdCl₂, K₂Cr₂O₇, and NaAsO₂. Biological network study shows that the genes which are differentially expressed are highly connected and having high betweenness and centrality.

Keywords: abiotic stress, biological network, chickpea, microarray

Procedia PDF Downloads 168
5693 Mapping Network Connection of Personality Traits and Psychiatric Symptoms in Chinese Adolescents

Authors: Yichao Lv, Minmin Cai, Yanqiang Tao, Xinyuan Zou, Chao Zhang, Xiangping Liu

Abstract:

Objective: This study aims to explore the network structure of personality traits and mental health and identify key factors for effective intervention strategies. Methods: All participants (N = 6,067; 3,368 females) underwent the Eysenck Personality Scale (EPQ) to measure personality traits and the Symptom Self-rating Scale (SCL-90) to measure psychiatric symptoms. Using the mean value of the SCL-90 total score plus one standard deviation as the cutoff, 854 participants (14.08%; 528 females) were categorized as individuals exhibiting potential psychological symptoms and were included in the follow-up network analysis. The structure and bridge centrality of the network for dimensions of EPQ and SCL-90 were estimated. Results: Between the EPQ and SCL-90, psychoticism (P), extraversion (E), and neuroticism (N) showed the strongest positive correlations with somatization (Som), interpersonal sensitivity (IS), and hostility (Hos), respectively. Extraversion (E), somatization (Som), and anxiety (Anx) were identified as the most important bridge factors influencing the overall network. Conclusions: This study explored the network structure and complex connections between mental health and personality traits from a network perspective, providing potential targets for intervening in adolescent personality traits and mental health.

Keywords: EPQ, SCL-90, Chinese adolescents, network analysis

Procedia PDF Downloads 19
5692 Clinical Relevance of TMPRSS2-ERG Fusion Marker for Prostate Cancer

Authors: Shalu Jain, Anju Bansal, Anup Kumar, Sunita Saxena

Abstract:

Objectives: The novel TMPRSS2:ERG gene fusion is a common somatic event in prostate cancer that in some studies is linked with a more aggressive disease phenotype. Thus, this study aims to determine whether clinical variables are associated with the presence of TMPRSS2:ERG-fusion gene transcript in Indian patients of prostate cancer. Methods: We evaluated the clinical variables with presence and absence of TMPRSS2:ERG gene fusion in prostate cancer and BPH association of clinical patients. Patients referred for prostate biopsy because of abnormal DRE or/and elevated sPSA were enrolled for this prospective clinical study. TMPRSS2:ERG mRNA copies in samples were quantified using a Taqman chemistry by real time PCR assay in prostate biopsy samples (N=42). The T2:ERG assay detects the gene fusion mRNA isoform TMPRSS2 exon1 to ERG exon4. Results: Histopathology report has confirmed 25 cases as prostate cancer adenocarcinoma (PCa) and 17 patients as benign prostate hyperplasia (BPH). Out of 25 PCa cases, 16 (64%) were T2: ERG fusion positive. All 17 BPH controls were fusion negative. The T2:ERG fusion transcript was exclusively specific for prostate cancer as no case of BPH was detected having T2:ERG fusion, showing 100% specificity. The positive predictive value of fusion marker for prostate cancer is thus 100% and the negative predictive value is 65.3%. The T2:ERG fusion marker is significantly associated with clinical variables like no. of positive cores in prostate biopsy, Gleason score, serum PSA, perineural invasion, perivascular invasion and periprostatic fat involvement. Conclusions: Prostate cancer is a heterogeneous disease that may be defined by molecular subtypes such as the TMPRSS2:ERG fusion. In the present prospective study, the T2:ERG quantitative assay demonstrated high specificity for predicting biopsy outcome; sensitivity was similar to the prevalence of T2:ERG gene fusions in prostate tumors. These data suggest that further improvement in diagnostic accuracy could be achieved using a nomogram that combines T2:ERG with other markers and risk factors for prostate cancer.

Keywords: prostate cancer, genetic rearrangement, TMPRSS2:ERG fusion, clinical variables

Procedia PDF Downloads 421
5691 A Case of Osteopetrosis Diagnosed with Nystagmus

Authors: Zerrin Orbak, Busra Demir

Abstract:

Osteopetrosis is a rare genetic disease characterized by impaired bone resorption and increased bone sclerosis. Clinical presentation is very different in osteopetrosis. It can be asymptomatic or can be seen with typical symptoms. Here, a case of osteopetrosis was presented when evaluated for nystagmus. She was 10 months old. Parents were second-degree relatives. On physical examination, pigeon chest deformity and horizontal nystagmus were observed. There was a failure of thrive but no fracture. The cardiovascular examination was normal. Cranial, vertebral and long bone roentgenograms revealed characteristic deformities of osteopetrosis and diffuse sclerosis. The diagnosis was confirmed by genetic testing. A Homozygous mutation was detected in the TNFRSF11A gene (c.508A>G p.(Arg170Gly)). RANKL is encoded by the tumor necrosis factor ligand superfamily member 11 (TNFSF11) gene, and the binding to its receptor RANK, encoded by the TNFRSF11A gene, determines the activation of the downstream pathway that drives osteoclast differentiation and activation (51). The complete absence of osteoclasts is the key feature of the osteoclast-poor form of osteopetrosis (46). Patients are characterized by the absence of TRAP-positive osteoclasts in bone biopsies. The osteoclast-poor subtype of osteopetrosis caused by mutations in TNFSF11 gene is ultra-rare in humans. Clinical presentation is usually severe, with onset in early infancy or in fetal life. But here, a case was presented with horizontal nystagmus. A case presented with horizontal nystagmus, which was evaluated by neurology and diagnosed incidentally, was shared.

Keywords: osteopetrosis, nystagmus, bone, osteoclast-poor

Procedia PDF Downloads 62
5690 NSBS: Design of a Network Storage Backup System

Authors: Xinyan Zhang, Zhipeng Tan, Shan Fan

Abstract:

The first layer of defense against data loss is the backup data. This paper implements an agent-based network backup system used the backup, server-storage and server-backup agent these tripartite construction, and we realize the snapshot and hierarchical index in the NSBS. It realizes the control command and data flow separation, balances the system load, thereby improving the efficiency of the system backup and recovery. The test results show the agent-based network backup system can effectively improve the task-based concurrency, reasonably allocate network bandwidth, the system backup performance loss costs smaller and improves data recovery efficiency by 20%.

Keywords: agent, network backup system, three architecture model, NSBS

Procedia PDF Downloads 430
5689 Intelligent Grading System of Apple Using Neural Network Arbitration

Authors: Ebenezer Obaloluwa Olaniyi

Abstract:

In this paper, an intelligent system has been designed to grade apple based on either its defective or healthy for production in food processing. This paper is segmented into two different phase. In the first phase, the image processing techniques were employed to extract the necessary features required in the apple. These techniques include grayscale conversion, segmentation where a threshold value is chosen to separate the foreground of the images from the background. Then edge detection was also employed to bring out the features in the images. These extracted features were then fed into the neural network in the second phase of the paper. The second phase is a classification phase where neural network employed to classify the defective apple from the healthy apple. In this phase, the network was trained with back propagation and tested with feed forward network. The recognition rate obtained from our system shows that our system is more accurate and faster as compared with previous work.

Keywords: image processing, neural network, apple, intelligent system

Procedia PDF Downloads 374
5688 Suggestion for Malware Detection Agent Considering Network Environment

Authors: Ji-Hoon Hong, Dong-Hee Kim, Nam-Uk Kim, Tai-Myoung Chung

Abstract:

Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS.

Keywords: android malware detection, software-defined network, interaction environment, android malware detection, software-defined network, interaction environment

Procedia PDF Downloads 407
5687 Reliability Improvement of Power System Networks Using Adaptive Genetic Algorithm

Authors: Alireza Alesaadi

Abstract:

Reliability analysis is a powerful method for determining the weak points of the electrical networks. In designing of electrical network, it is tried to design the most reliable network with minimal system shutting down, but it is usually associated with increasing the cost. In this paper, using adaptive genetic algorithm, a method was presented that provides the most reliable system with a certain economical cost. Finally, the proposed method is applied to a sample network and results will be analyzed.

Keywords: reliability, adaptive genetic algorithm, electrical network, communication engineering

Procedia PDF Downloads 468
5686 GIS-Based Topographical Network for Minimum “Exertion” Routing

Authors: Katherine Carl Payne, Moshe Dror

Abstract:

The problem of minimum cost routing has been extensively explored in a variety of contexts. While there is a prevalence of routing applications based on least distance, time, and related attributes, exertion-based routing has remained relatively unexplored. In particular, the network structures traditionally used to construct minimum cost paths are not suited to representing exertion or finding paths of least exertion based on road gradient. In this paper, we introduce a topographical network or “topograph” that enables minimum cost routing based on the exertion metric on each arc in a given road network as it is related to changes in road gradient. We describe an algorithm for topograph construction and present the implementation of the topograph on a road network of the state of California with ~22 million nodes.

Keywords: topograph, RPE, routing, GIS

Procedia PDF Downloads 521
5685 Design an Intelligent Fire Detection System Based on Neural Network and Particle Swarm Optimization

Authors: Majid Arvan, Peyman Beygi, Sina Rokhsati

Abstract:

In-time detection of fire in buildings is of great importance. Employing intelligent methods in data processing in fire detection systems leads to a significant reduction of fire damage at lowest cost. In this paper, the raw data obtained from the fire detection sensor networks in buildings is processed by using intelligent methods based on neural networks and the likelihood of fire happening is predicted. In order to enhance the quality of system, the noise in the sensor data is reduced by analyzing wavelets and applying SVD technique. Meanwhile, the proposed neural network is trained using particle swarm optimization (PSO). In the simulation work, the data is collected from sensor network inside the room and applied to the proposed network. Then the outputs are compared with conventional MLP network. The simulation results represent the superiority of the proposed method over the conventional one.

Keywords: intelligent fire detection, neural network, particle swarm optimization, fire sensor network

Procedia PDF Downloads 353
5684 Clinical and Molecular Characterization of 120 Families with Sporadic Juvenile Onset Open Angle Glaucoma

Authors: Bindu I. Somarajan, Viney Gupta, Gagandeep Kaur Walia, Jasbir Kaur, Sunil Kumar, Shikha Gupta, Abadh K. Chaurasia, Dinesh Gupa, Abhinav Kaushik, Aditi Mehta, Vipin Gupta, Arundhati Sharma

Abstract:

Background: Juvenile onset primary open angle glaucoma (JOAG), affects individuals under the age of 40 years. Studies on a few families of JOAG, that led to the discovery of the Myocilin gene, reported the disease to have an autosomal dominant pattern of inheritance. However, sporadic forms of JOAG been seen to be more common in some populations. Most pathological homozygous mutations in the CYP1B1 gene associated with JOAG have been seen among sporadic cases. Given the higher prevalence of sporadic JOAG cases in our population, we aimed to look for common mutations E229K and R368H, the two most common variants in the CYP1B1 gene associated with glaucoma. Objective: To determine the frequency and evaluate genotype phenotype correlation of CYP1B1 E229K and R368H mutations in a cohort of 120 sporadic Juvenile open angle glaucoma patients.Methods: Unrelated JOAG patients whose first degree relatives had been examined and found to be unaffected were included in the study. The patients and their parents were screened for E229K and R368H mutations. The phenotypic characteristics were compared between probands with and with out these mutations by SPSS v16. Results: Out of 120 JOAG patients included in the study, the E229K mutation was seen in 9 probands (7.5%) and R368H in 7 (5.8%). The average age of onset of the disease (p=0.3) and the highest untreated IOP (p=0.4) among those carrying mutations was not significantly different from those who did not have these mutations. The proportion of probands with angle dysgenesis among those with E229K and R368H mutations was 70% (11 out of 16) in comparison to 65% (67 out of 104) of those who did not harbour these mutations (p=0.56). Similarly the probands with moderate to high myopia among those with E229K and R368H mutations was 20% (3 out of 16) in comparison to 18% (18 out of 104) of those who did not harbour these mutations(p=0.59). Conclusion: The frequency of E229K and R368H mutations of the CYP1B1 gene is low even among sporadic JOAG patients. Moreover there is no clinical correlation between the presence of these mutations and disease severity

Keywords: CYP1B1, gene, IOP, JOAG, mutation

Procedia PDF Downloads 308
5683 A Study of Growth Performance, Carcass Characteristic, Meat Quality and Association of Polymorphism in the ApoVLDL-II Gene with Fat Accumulation in the Female Broiler, Thai Native and Betong Chickens (KU Line)

Authors: C. Kridtayopas, W. Danvilai, P. Sopannarath, A. Kayan, W. Loongyai

Abstract:

Both Betong chicken (KU Line) and Thai Native chickens were the high quality of the meat and low carcass fat compared to broiler chickens. The objective of this study was to determine the growth performance, carcass characteristic, meat quality and association of polymorphism in the ApoVLDL-II gene with fat accumulation in the female broiler, Thai Native and Betong (KU line) chickens at 4-14 weeks. The chickens were used and reared under the same environment and management (100 chicks per breed). The results showed that body weight (BW) of broiler chickens was significantly higher than Thai Native and Betong (KU line) chickens (P < 0.01) through all the experiment. At 4-8 weeks of age, feed conversion ratio (FCR) of broiler chickens was significantly better than Thai Native and Betong (KU line) chickens (P < 0.01), then increased at week 8-14. The percentage of breast, abdominal fat and subcutaneous fat of broiler chickens was significantly greater than Thai Native and Betong (KU line) chickens (P < 0.01). However, Thai Native chickens showed the highest percentage of liver (P < 0.01) when compared to other breeds. In addition, the percentage of wing of Thai Native and Betong (KU line) chickens were significantly (P < 0.01) higher than broiler chickens. Meat quality was also determined and found that, pH of breast meat left from slaughter 45 minutes (pH45) and 24 hours (pH24) of broiler was significantly higher than Thai Native and Betong (KU line) (P < 0.01) whereas the percentage of drip loss, thawing loss, cooking loss and shear force was not significantly different between breeds. The polymerase chain reaction-restriction fragment length polymorphism (PCR-RFLP) technique was used to genotype the polymorphism in the ApoVLDL-II gene in the broiler, Thai Native and Betong (KU line) chickens. The results found that, the polymorphism in the ApoVLDL-II gene at VLDL6 loci was not associated with fat accumulation in those studied population.

Keywords: ApoVLDL-II gene, Betong (KU line) chickens, broiler chickens, carcass characteristic, growth performance, meat quality, Thai native chickens

Procedia PDF Downloads 178
5682 Network Word Discovery Framework Based on Sentence Semantic Vector Similarity

Authors: Ganfeng Yu, Yuefeng Ma, Shanliang Yang

Abstract:

The word discovery is a key problem in text information retrieval technology. Methods in new word discovery tend to be closely related to words because they generally obtain new word results by analyzing words. With the popularity of social networks, individual netizens and online self-media have generated various network texts for the convenience of online life, including network words that are far from standard Chinese expression. How detect network words is one of the important goals in the field of text information retrieval today. In this paper, we integrate the word embedding model and clustering methods to propose a network word discovery framework based on sentence semantic similarity (S³-NWD) to detect network words effectively from the corpus. This framework constructs sentence semantic vectors through a distributed representation model, uses the similarity of sentence semantic vectors to determine the semantic relationship between sentences, and finally realizes network word discovery by the meaning of semantic replacement between sentences. The experiment verifies that the framework not only completes the rapid discovery of network words but also realizes the standard word meaning of the discovery of network words, which reflects the effectiveness of our work.

Keywords: text information retrieval, natural language processing, new word discovery, information extraction

Procedia PDF Downloads 64
5681 Unzipping the Stress Response Genes in Moringa oleifera Lam. through Transcriptomics

Authors: Vivian A. Panes, Raymond John S. Rebong, Miel Q. Diaz

Abstract:

Moringa oleifera Lam. is known mainly for its high nutritional value and medicinal properties contributing to its popular reputation as a 'miracle plant' in the tropical climates where it usually grows. The main objective of this study is to discover the genes and gene products involved in abiotic stress-induced activity that may impact the M. oleifera Lam. mature seeds as well as their corresponding functions. In this study, RNA-sequencing and de novo transcriptome assembly were performed using two assemblers, Trinity and Oases, which produced 177,417 and 120,818 contigs respectively. These transcripts were then subjected to various bioinformatics tools such as Blast2GO, UniProt, KEGG, and COG for gene annotation and the analysis of relevant metabolic pathways. Furthermore, FPKM analysis was performed to identify gene expression levels. The sequences were filtered according to the 'response to stress' GO term since this study dealt with stress response. Clustered Orthologous Groups (COG) showed that the highest frequencies of stress response gene functions were those of cytoskeleton which make up approximately 14% and 23% of stress-related sequences under Trinity and Oases respectively, recombination, repair and replication at 11% and 14% respectively, carbohydrate transport and metabolism at 23% and 9% respectively and defense mechanisms 16% and 12% respectively. KEGG pathway analysis determined the most abundant stress-response genes in the phenylpropanoid biosynthesis at counts of 187 and 166 pathways for Oases and Trinity respectively, purine metabolism at 123 and 230 pathways, and biosynthesis of antibiotics at 105 and 102. Unique and cumulative GO term counts revealed that majority of the stress response genes belonged to the category of cellular response to stress at cumulative counts of 1,487 to 2,187 for Oases and Trinity respectively, defense response at 754 and 1,255, and response to heat at 213 and 208, response to water deprivation at 229 and 228, and oxidative stress at 508 and 488. Lastly, FPKM was used to determine the levels of expression of each stress response gene. The most upregulated gene encodes for thiamine thiazole synthase chloroplastic-like enzyme which plays a significant role in DNA damage tolerance. Data analysis implies that M. oleifera stress response genes are directed towards the effects of climate change more than other stresses indicating the potential of M. oleifera for cultivation in harsh environments because it is resistant to climate change, pathogens, and foreign invaders.

Keywords: stress response, genes, Moringa oleifera, transcriptomics

Procedia PDF Downloads 121
5680 New Targets Promoting Oncolytic Virotherapy

Authors: Felicia Segeth, Florian G. Klein, Lea Berger, Andreas Kolk, Per S. Holm

Abstract:

The entry of oncolytic viruses (OVs) into clinical application opens groundbreaking changes in current and future treatment regimens. However, despite their potent anti-cancer activity in vitro, clinical studies revealed limitations of OVs as monotherapy. The same applies to CDK 4/6 inhibitors (CDK4/6i) targeting cell cycle as well as bromodomain and extra-terminal domain inhibitors (BETi) targeting gene expression. In this study, the anti-tumoral effect of XVir-N-31, an YB-1 dependent oncolytic adenovirus, was evaluated in combination with Ribociclib, a CDK4/6i, and JQ1, a BETi. The head and neck squamous cell carcinoma (HNSCC) cell lines Fadu, SAS, and Cal-33 were used. DNA replication and gene expression of XVir-N-31 was measured by RT-qPCR, protein expression by western blotting, and cell lysis by SRB assays. Treatment with CDK4/6i and BETi increased viral gene expression, viral DNA replication, and viral particle formation. The data show that the combination of oncolytic adenovirus XVir-N-31 with CDK4/6i & BETi acts highly synergistic in cancer cell lysis. Furthermore, additional molecular analyses on this subject demonstrate that the positive transcription elongation factor P-TEFb plays a decisive role in this regard, indicating an influence of the combinational therapy on gene transcription control. The combination of CDK4/6i & BETi and XVir-N-31 is an attractive strategy to achieve substantial cancer cell killing and is highly suitable for clinical testing.

Keywords: adenovirus, BET, CDK4/6, HNSCC, P-TEFb, YB-1

Procedia PDF Downloads 93
5679 Optimization of Reliability and Communicability of a Random Two-Dimensional Point Patterns Using Delaunay Triangulation

Authors: Sopheak Sorn, Kwok Yip Szeto

Abstract:

Reliability is one of the important measures of how well the system meets its design objective, and mathematically is the probability that a complex system will perform satisfactorily. When the system is described by a network of N components (nodes) and their L connection (links), the reliability of the system becomes a network design problem that is an NP-hard combinatorial optimization problem. In this paper, we address the network design problem for a random point set’s pattern in two dimensions. We make use of a Voronoi construction with each cell containing exactly one point in the point pattern and compute the reliability of the Voronoi’s dual, i.e. the Delaunay graph. We further investigate the communicability of the Delaunay network. We find that there is a positive correlation and a negative correlation between the homogeneity of a Delaunay's degree distribution with its reliability and its communicability respectively. Based on the correlations, we alter the communicability and the reliability by performing random edge flips, which preserve the number of links and nodes in the network but can increase the communicability in a Delaunay network at the cost of its reliability. This transformation is later used to optimize a Delaunay network with the optimum geometric mean between communicability and reliability. We also discuss the importance of the edge flips in the evolution of real soap froth in two dimensions.

Keywords: Communicability, Delaunay triangulation, Edge Flip, Reliability, Two dimensional network, Voronio

Procedia PDF Downloads 389
5678 A New Method to Reduce 5G Application Layer Payload Size

Authors: Gui Yang Wu, Bo Wang, Xin Wang

Abstract:

Nowadays, 5G service-based interface architecture uses text-based payload like JSON to transfer business data between network functions, which has obvious advantages as internet services but causes unnecessarily larger traffic. In this paper, a new 5G application payload size reduction method is presented to provides the mechanism to negotiate about new capability between network functions when network communication starts up and how 5G application data are reduced according to negotiated information with peer network function. Without losing the advantages of 5G text-based payload, this method demonstrates an excellent result on application payload size reduction and does not increase the usage quota of computing resource. Implementation of this method does not impact any standards or specifications and not change any encoding or decoding functionality too. In a real 5G network, this method will contribute to network efficiency and eventually save considerable computing resources.

Keywords: 5G, JSON, payload size, service-based interface

Procedia PDF Downloads 147
5677 Thermal Network Model for a Large Scale AC Induction Motor

Authors: Sushil Kumar, M. Dakshina Murty

Abstract:

Thermal network modelling has proven to be important tool for thermal analysis of electrical machine. This article investigates numerical thermal network model and experimental performance of a large-scale AC motor. Experimental temperatures were measured using RTD in the stator which have been compared with the numerical data. Thermal network modelling fairly predicts the temperature of various components inside the large-scale AC motor. Results of stator winding temperature is compared with experimental results which are in close agreement with accuracy of 6-10%. This method of predicting hot spots within AC motors can be readily used by the motor designers for estimating the thermal hot spots of the machine.

Keywords: AC motor, thermal network, heat transfer, modelling

Procedia PDF Downloads 297
5676 A Two-Step Framework for Unsupervised Speaker Segmentation Using BIC and Artificial Neural Network

Authors: Ahmad Alwosheel, Ahmed Alqaraawi

Abstract:

This work proposes a new speaker segmentation approach for two speakers. It is an online approach that does not require a prior information about speaker models. It has two phases, a conventional approach such as unsupervised BIC-based is utilized in the first phase to detect speaker changes and train a Neural Network, while in the second phase, the output trained parameters from the Neural Network are used to predict next incoming audio stream. Using this approach, a comparable accuracy to similar BIC-based approaches is achieved with a significant improvement in terms of computation time.

Keywords: artificial neural network, diarization, speaker indexing, speaker segmentation

Procedia PDF Downloads 470
5675 Prevalence of Clostridium perfringens β2-Toxin in Type a Isolates of Sheep and Goats

Authors: Mudassar Mohiuddin, Zahid Iqbal

Abstract:

Introduction: Clostridium perfringens is an important pathogen responsible for causing enteric diseases in both human and animals. The bacteria produce several toxins. These toxins play vital role in the pathogenesis of various fatal enteric diseases and are classified into five types, on the basis of the differential production of Alpha, Beta, Epsilon and Iota toxins. In addition to the so-called major toxins, there are other toxins like beta2 toxin, produced by some strains of C. perfringens which may play a role in the pathogenesis of disease. Aim of the study: In this study a multiplex PCR assay was developed and used for detection of cpb2 gene to identify the Beta2 harboring isolates among different types of C. perfringens. Objectives: The primary objective of this study was to identify the prevalence of β2-toxin gene in local isolates of Clostridium perfringens. Methodology: This was an experimental study. Random sampling technique was used. A total of 97 sheep and goats were included in this study. All were Pakistani local breeds. The samples were collected during the period from Sep, 2014 to Mar, 2015 from selected districts of Punjab province (Pakistan). Faecal samples were cultured in cooked meat media. The identification of Clostridium perfringens was made on the basis of biochemical tests. Multiplex PCR was performed to identify the toxin genes. Results: A total of 43 C. perfringens isolates were genotyped using multiplex PCR assay. The gene encoding C. perfringens β2-toxin (cpb2) was present in more than 50% of the isolates genotyped. However, the prevalence of this gene varied between sheep and goat isolates. Conclusion: The present study suggests the high occurrence of C. perfringens b2-toxin (cpb2) in the local isolates of Pakistan. As β2-toxin is present in both healthy and diseased animals, so further studies are suggested to establish the role of β2-toxin in pathogenesis of the clostridial enteric diseases.

Keywords: beta 2 toxin gene, clostridium perfringens, enteric diseases, goats, multiplex PCR, sheep

Procedia PDF Downloads 433
5674 Identification of Soft Faults in Branched Wire Networks by Distributed Reflectometry and Multi-Objective Genetic Algorithm

Authors: Soumaya Sallem, Marc Olivas

Abstract:

This contribution presents a method for detecting, locating, and characterizing soft faults in a complex wired network. The proposed method is based on multi-carrier reflectometry MCTDR (Multi-Carrier Time Domain Reflectometry) combined with a multi-objective genetic algorithm. In order to ensure complete network coverage and eliminate diagnosis ambiguities, the MCTDR test signal is injected at several points on the network, and the data is merged between different reflectometers (sensors) distributed on the network. An adapted multi-objective genetic algorithm is used to merge data in order to obtain more accurate faults location and characterization. The proposed method performances are evaluated from numerical and experimental results.

Keywords: wired network, reflectometry, network distributed diagnosis, multi-objective genetic algorithm

Procedia PDF Downloads 164
5673 Implementation and Demonstration of Software-Defined Traffic Grooming

Authors: Lei Guo, Xu Zhang, Weigang Hou

Abstract:

Since the traditional network is closed and it has no architecture to create applications, it has been unable to evolve with changing demands under the rapid innovation in services. Additionally, due to the lack of the whole network profile, the quality of service cannot be well guaranteed in the traditional network. The Software Defined Network (SDN) utilizes global resources to support on-demand applications/services via open, standardized and programmable interfaces. In this paper, we implement the traffic grooming application under a real SDN environment, and the corresponding analysis is made. In our SDN: 1) we use OpenFlow protocol to control the entire network by using software applications running on the network operating system; 2) several virtual switches are combined into the data forwarding plane through Open vSwitch; 3) An OpenFlow controller, NOX, is involved as a logically centralized control plane that dynamically configures the data forwarding plane; 4) The traffic grooming based on SDN is demonstrated through dynamically modifying the idle time of flow entries. The experimental results demonstrate that the SDN-based traffic grooming effectively reduces the end-to-end delay, and the improvement ratio arrives to 99%.

Keywords: NOX, OpenFlow, Software Defined Network (SDN), traffic grooming

Procedia PDF Downloads 228
5672 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 119
5671 Reliable Multicast Communication in Next Generation Networks

Authors: Muazzam Ali Khan Khattak

Abstract:

Next Generation Network is combination of different networks having different technologies. Due to mobile nature of nodes the movement of nodes occurs from one network to another network. Multicasting in such networks is still a hot issue of research because the user in today's world wants reliable communication wherever it lies. Due to heterogeneity of NGN it is very difficult to handle reliable multicast communication. In this paper we proposed an improved scheme for reliable multicast communication in next generation networks. Because multicast communication is very important to deliver same data packets to multiple receivers and minimize the network traffic. This new scheme will make the multicast communication in NGN more reliable and efficient.

Keywords: next generation networks, route request, IPT, NACK, ARQ, DTN

Procedia PDF Downloads 471
5670 Characterization of an Isopropanol-Butanol Clostridium

Authors: Chen Zhang, Fengxue Xin, Jianzhong He

Abstract:

A unique Clostridium beijerinckii species strain BGS1 was obtained from grass land samples, which is capable of producing 8.43g/L butanol and 3.21 isopropanol from 60g/L glucose while generating 4.68g/L volatile fatty acids (VFAs) from 30g/L xylan. The concentration of isopropanol produced by culture BGS1 is ~15% higher than previously reported wild-type Clostridium beijerinckii under similar conditions. Compared to traditional Acetone-Butanol-Ethanol (ABE) fermentation species, culture BGS1 only generates negligible amount of ethanol and acetone, but produces butanol and isopropanol as biosolvent end-products which are pure alcohols and more economical than ABE. More importantly, culture BGS1 can consume acetone to produce isopropanol, e.g., 1.84g/L isopropanol from 0.81g/L acetone in 60g/L glucose medium containing 6.15g/L acetone. The analysis of BGS1 draft genome annotated by RAST server demonstrates that no ethanol production is caused by the lack of pyruvate decarboxylase gene – related to ethanol production. In addition, an alcohol dehydrogenase (adhe gene) was found in BGS1 which could be a potential gene responsible for isopropanol-generation. This is the first report on Isopropanol-Butanol (IB) fermentation by wild-type Clostridium strain and its application for isopropanol and butanol production.

Keywords: acetone conversion, butanol, clostridium, isopropanol

Procedia PDF Downloads 264
5669 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 395
5668 Gene Expression and Staining Agents: Exploring the Factors That Influence the Electrophoretic Properties of Fluorescent Proteins

Authors: Elif Tugce Aksun Tumerkan, Chris Lowe, Hannah Krupa

Abstract:

Fluorescent proteins are self-sufficient in forming chromophores with a visible wavelength from 3 amino acids sequence within their own polypeptide structure. This chromophore – a molecule that absorbs a photon of light and exhibits an energy transition equal to the energy of the absorbed photon. Fluorescent proteins (FPs) consisted of a chain of 238 amino acid residues and composed of 11 beta strands shaped in a cylinder surrounding an alpha helix structure. A better understanding of the system of the chromospheres and the increasing advance in protein engineering in recent years, the properties of FPs offers the potential for new applications. They have used sensors and probes in molecular biology and cell-based research that giving a chance to observe these FPs tagged cell localization, structural variation and movement. For clarifying functional uses of fluorescent proteins, electrophoretic properties of these proteins are one of the most important parameters. Sodium dodecyl sulphate polyacrylamide gel electrophoresis (SDS-PAGE) analysis is used for determining electrophoretic properties commonly. While there are many techniques are used for determining the functionality of protein-based research, SDS-PAGE analysis can only provide a molecular level assessment of the proteolytic fragments. Before SDS-PAGE analysis, fluorescent proteins need to successfully purified. Due to directly purification of the target, FPs is difficult from the animal, gene expression is commonly used which must be done by transformation with the plasmid. Furthermore, used gel within electrophoresis and staining agents properties have a key role. In this review, the different factors that have the impact on the electrophoretic properties of fluorescent proteins explored. Fluorescent protein separation and purification are the essential steps before electrophoresis that should be done very carefully. For protein purification, gene expression process and following steps have a significant function. For successful gene expression, the properties of selected bacteria for expression, used plasmid are essential. Each bacteria has own characteristics which are very sensitive to gene expression, also used procedure is the important factor for fluorescent protein expression. Another important factors are gel formula and used staining agents. Gel formula has an effect on the specific proteins mobilization and staining with correct agents is a key step for visualization of electrophoretic bands of protein. Visuality of proteins can be changed depending on staining reagents. Apparently, this review has emphasized that gene expression and purification have a stronger effect than electrophoresis protocol and staining agents.

Keywords: cell biology, gene expression, staining agents, SDS-page

Procedia PDF Downloads 168
5667 A Review of Literature for Online Social Network Business Continuance Intention and the Hypotheses Thereof

Authors: Akwesi Assensoh-Kodua

Abstract:

Online Social Networks (OSN) has come and gone, yet the explosion of business activities on such platforms continuous to surge high, giving advantage to the bold entrepreneurs. It is therefore a practical requirement that practitioners and researchers understand the key determinants of costumers’ online social network business activities and continuance intention. An exploratory literature research to examine OSN continuous intention of business participants on OSN revealed that the practice of doing business on social network has come to stay and the following factors are the likely drivers for this new business model: perceived trust, perceived ease of use, confirmation, habit, social norm, perceived behavioural control, expected benefit, and satisfaction are the most probable factors that can lead to online social network (OSN) continuance intention.

Keywords: online social network, continuance intention, business continuance

Procedia PDF Downloads 467
5666 The Construction of a Probiotic Lactic Acid Bacterium Expressing Acid-Resistant Phytase Enzyme

Authors: R. Majidzadeh Heravi, M. Sankian, H. Kermanshahi, M. R. Nassiri, A. Heravi Moussavi, S. A. Lari, A. R. Varasteh

Abstract:

The use of probiotics engineered to express specific enzymes has been the subject of considerable attention in poultry industry because of increased nutrient availability and reduced cost of enzyme supplementation. Phytase enzyme is commonly added to poultry feed to improve digestibility and availability of phosphorus from plant sources. To construct a probiotic with potential of phytate degradation, phytase gene (appA) from E. coli was cloned and transformed into two probiotic bacteria Lactobacillus salivarius and Lactococcus lactis. L. salivarous showed plasmid instability, unable to express the gene. The expression of appA gene in L. lactis was analyzed by detecting specific RNA and zymography assay. Phytase enzyme was isolated from cellular extracts of recombinant L. lactis, showing a 46 kDa band upon the SDS-PAGE analysis. Zymogram also confirmed the phytase activity of the 46 kDa band corresponding to the enzyme. An enzyme activity of 4.9U/ml was obtained in cell extracts of L. lactis. The growth of native and recombinant L. lactis was similar in the presence of two concentrations of ox bile.

Keywords: Lactobacillus salivarus, Lactococcuslactis, recombinant, phytase, poultry

Procedia PDF Downloads 462
5665 Optimizing Network Latency with Fast Path Assignment for Incoming Flows

Authors: Qing Lyu, Hang Zhu

Abstract:

Various flows in the network require to go through different types of middlebox. The improper placement of network middlebox and path assignment for flows could greatly increase the network latency and also decrease the performance of network. Minimizing the total end to end latency of all the ows requires to assign path for the incoming flows. In this paper, the flow path assignment problem in regard to the placement of various kinds of middlebox is studied. The flow path assignment problem is formulated to a linear programming problem, which is very time consuming. On the other hand, a naive greedy algorithm is studied. Which is very fast but causes much more latency than the linear programming algorithm. At last, the paper presents a heuristic algorithm named FPA, which takes bottleneck link information and estimated bandwidth occupancy into consideration, and achieves near optimal latency in much less time. Evaluation results validate the effectiveness of the proposed algorithm.

Keywords: flow path, latency, middlebox, network

Procedia PDF Downloads 181